The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since computing infrastructure has intrinsically a redundant logic, budget saving practices or understaffing of IT departments lead to an “emergency room” service paradigm. However, a treasure of information that could facilitate preemptive maintenance is buried in the logs and messages that are automatically generated by regular processes. Such information is typically ignored because of the shear...
This paper proposes the practical implementation of a balanced electrical supply among the grid, residential units and shared facility controllers for designing future smart home energy services. To achieve energy economization, the project involves design and analysis of a database management system incorporated with different web applications. The main purpose for using these technologies is to...
This paper presents the design and implementation of an Internet of Thing (IoT)-based system for indoor localization using Bluetooth Low Energy (BLE) technology. Our solution consists of two main systems: an acquisition system and a central server, under the Client-Server paradigm and the IoT philosophy. We report the development of different modules: measurement (Bluetooth beacons), data aggregation...
In recent years, there is a rapid development in the software outsourcing industry. The most important problem we currently need to solve is talent shortage. So, it is very necessary for us to build up a platform, which focus on training software outsourcing talent. We provide a platform to contact the government, university, enterprise and professional training institutions together. This platform...
Information and Communication Technology is always walking in the forefront of human education. Now, it is the stage where human education has to adapt itself to the developing technologies. In 2016, the Natural Science Foundation suggested that people need to use the human-technology to improve and extend the human learning. This paper provides the concept of Software Defined Class (SDC), where the...
A novel design of pole mounted switch controller is introduced in this paper, embedded Linux operating system was used to enrich the functions of the pole mounted controller and to enhance the intelligence of the controller. Software structure of this novel designed controller is presented in detail. Multiple processes design method was applied to split the software application into 3 processes, namely...
The ability to recognize emotions in spoken words is central in human communication and social relationships. When studying one's ability to perceive emotions, the standard paradigm is to have listeners choose which one of several emotion words best characterizes linguistically neutral utterances made by actors attempting to portray various emotional states. Usually, generic experiment control software...
The problem of the discovery and marketing of new drugs can be vastly accelerated through High Performance Computing (HPC), molecular modeling techniques, and more specifically by means of the techniques commonly named as computational drug discovery (CDD) and in silico high throughput screening. These techniques usually assume a unique interaction site (active site) between potential drugs and a...
Network Function Virtualization (NFV) and Software-Defined Networking (SDN) are two paradigms that have attracted much attention in the networking field. The first permits the implementation of Network Functions (NFs) on commodity servers located in datacenters. The second facilitates the management and routing of network flows by controllers. While recent work has mostly explored the use of NFV and...
We consider the case of spreadsheet based workgroup collaboration, in which users cooperate through spreadsheets. While spreadsheet exchange through email and shared directories is still the most common way to share data, spreadsheet sharing in the Cloud is rapidly spreading, leveraging the evolution of office tools toward delocalized system over the Cloud. In this paper we observe that spreadsheet...
A major cyber-security concern to date for webservers are Distributed Denial of Service (DDoS) attacks. Previously we proposed a novel overlay-based method consisting of distributed network of public servers (PS) for preparation, and access nodes (AN) for actual communication. The AN's performance is evaluated under difficult to detect HTTP(S)-DDoS attacks. Yet, attackers may attempt service denial...
Campus networks and enterprise networks increasingly depend on middleboxes (e.g., firewalls, NAT, load balancers, IDS/IDP) to provide essential services or enforce network policies. These middleboxes often limit the performance of network applications, especially those involved in big data transfer. To address this problem, we propose a Software Defined Networking (SDN) campus network architecture,...
In this paper, we propose using an approach based on the system-level programming language SystemJ extended with service oriented features, called SOSJ, to design dynamic interoperable software systems. The approach abstracts and integrates the worlds of automation and robotics systems by using a simple service interface based on abstract objects within SOSJ. We demonstrate our approach in a real-life...
A standardized Communication / Information Protocol is necessary for implementing the 4 upper digitalization layers of Industrie 4.0-compliant solutions. OPC UA is one of the leading and preferred technology. Currently, there are many different OPC UA implementations available on the market. This paper gives an overview of existing solutions and shows the results of an initial benchmarking based on...
The Internet of Things means a connected world. When reaching the industrial level, the automation equipment present a large life cycle and the systems are many times conceived using proprietary protocols. Bringing interoperability to local automation is often a difficult task and changes in the functional structures, particularly in the case of critical infrastructures like the water industry, have...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
Particulate matter pollution becomes an increasingly important problem in developing countries and poses a hazard to human health especially in indoor environment. At the same time, modern buildings are equipped with advanced sensing and control technologies, offering control and optimization capabilities over a large range of parameters. This paper proposes an open platform of a WiFi-enabled indoor...
The advances in computational techniques both from a software and hardware viewpoint lead to the development of projects whose complexity could be quite challenging, e.g., biomedical simulations. In order to deal with the increased demand of computational power many collaborative approaches have been proposed in order apply proper partitioning strategy able to assign pieces of execution to a crowd...
Physical exercising has always had an important impact on humans' health. Lack of motivation is one of the major reasons that keeps a person from exercising. To overcome this problem, new solutions are needed to provide weight watchers and fitness seekers motivation to exercise indoors. This paper presents iGym, a low cost and flexible system that enhances humans' workout experience. This system lets...
Software applications contain valuable assets that, if compromised, can make the security of users at stake and cause huge monetary losses for software developers. Software protections are applied whenever assets' security is at risk as they delay successful attacks. Unfortunately, protections might have recognizable fingerprints that can expose the location of the assets, thus facilitating the attackers'...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.